DOI QR코드

DOI QR Code

Secure and Efficient Package Management Techniques in Closed Networks

폐쇄망에서의 안전하고 효율적인 소프트웨어 패키지 관리 방안

  • Received : 2021.08.23
  • Accepted : 2021.10.20
  • Published : 2022.04.30

Abstract

In this paper, we present important factors and methodologies that we have to follow for secure and efficient package management systems in a closed network. By analyzing previous works, we present several security considerations for the existing package management systems. Based on the consideration, we propose guidelines regarding the use of package management systems in the closed network. More specifically, we propose the development of new package management tools, utilization of physical storage media, utilization of local backup repositories, package updates, and downgrade batches for secure and efficient package management.

본 연구는 폐쇄망에서 효율적이고 안전하게 패키지 관리 시스템을 사용하기 위해서 고려해야 할 할 중요 요소들과 그 방법론 들을 제시하는 것을 목적으로 한다. 관련 선행 연구의 분석을 통해 기존 패키지 관리에서 보안성을 위해 고려해야 할 사항들을 살펴보고, 이를 바탕으로 폐쇄망이라는 특수한 상황에서 고려해야 할 세부 방법들을 제안한다. 구체적으로, 새로운 패키지 관리 도구의 개발, 물리적 저장매체 활용, 로컬 백업 저장소 활용, 패키지 업데이트 및 다운그레이드 일괄 처리의 방법을 제안한다.

Keywords

Acknowledgement

이 논문은 2021년도 한화시스템(주)의 제원을 지원받아 수행된 연구임.

References

  1. Format of the RPM File - RPM File Format [Internet], http://ftp.rpm.org/max-rpm/s1-rpm-file-format-rpm-file-format.html.
  2. RPM Package File Structure [Internet], https://docs.fedoraproject.org/ro/Fedora_Draft_Documentation/0.1/html/RPM_Guide/ch-package-structure.html.
  3. RPM Package Manager [Internet], http://www.rpm.org/.
  4. A. Athalye, R. Hristov, T. Nguyen, and Q. Nguyen, "Package Manager Security," Tech. Rep. [Internet], https://pdfs.semanticscholar.org/d398/d240e916079e418b77ebb4b3730d7e959b15.pdf. 2020.
  5. Securing RPM Signing Keys [Internet], https://access.redhat.com/blogs/766093/posts/3373211.
  6. Man dpkg-sig [Internet], http://pwet.fr/man/linux/commandes/dpkg_sig.
  7. J. Cappos, J. Samuel, S. Baker, and J. H. Hartman, "A look in the mirror: Attacks on package managers," Proceedings of the 15th ACM conference on Computer and communications security, Oct. 2008.
  8. J. Cappos, J. Samuel, S. Baker, and J. H. Hartman, "Package management security," University of Arizona Technical Report, 2008.
  9. Y. H. Jo and E. K. Lee, "Design of information security management for industrial control system," Proceedings of the Korean Society of Computer Information Conference, Korean Society of Computer Information, Jan. 2016.
  10. J. Cappos et al., "Stork: Package management for distributed VM environments," Proceedings of the 21st Large Installation System Administration Conference (LISA '07), Nov. 2007.